Skip to content

Commit

Permalink
Merge pull request #5663 from microsoft/Dev
Browse files Browse the repository at this point in the history
Release 1.25.122.1
  • Loading branch information
NikCharlebois authored Jan 22, 2025
2 parents 8bb3543 + 3012725 commit a83edad
Show file tree
Hide file tree
Showing 211 changed files with 10,899 additions and 8,712 deletions.
70 changes: 70 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,75 @@
# Change log for Microsoft365DSC

# 1.25.122.1

* AADConditionalAccessPolicy
* Fixes CA policy deployment errors when deploying policies based for workload identities.
* Fixed DisableResilienceDefaults result
* Add DisableResilienceDefaults false szenario
* AADDeviceRegistrationPolicy
* Fixes an error when trying to disable AAD join.
* AADGroupsNamingPolicy
* Use correct parameter `DesiredValues` given to `Test-M365DSCParameterState`,
contrary to `EXOTenantAllowBlockListItems` these resources are not affected
but we still should use the correct parameter
* AADRoleSetting
* Fixed issue where missing settings object for a role caused errors.
FIXES [#5602](https://github.com/microsoft/Microsoft365DSC/issues/5602)
* AADServicePrincipal
* FIXES [#5549](https://github.com/microsoft/Microsoft365DSC/issues/5549)
* EXOAvailabilityConfig
* Removed dependency on Microsoft Graph to retrieve user information.
* EXODistributionGroup
* Removed dependency on Microsoft Graph to retrieve user information.
* EXOHostedContentFilterPolicy
* Use correct parameter `DesiredValues` given to `Test-M365DSCParameterState`,
contrary to `EXOTenantAllowBlockListItems` these resources are not affected
but we still should use the correct parameter
* EXOTenantAllowBlockListItems
* Fixed `Test-TargetResource` by using the correct parameter `DesiredValues`
given to `Test-M365DSCParameterState`
* EXOTransportRule
* Fix type of `SenderInRecipientList` in schema
* FabricAdminTenantSettings
* Added support for the AllowGetOneLakeUDK, AllowMountDfCreation, AllowOneLakeUDK,
ArtifactOrgAppPreview properties.
* Fix values that have a zero length whitespace character.
* IntuneAppProtectionPolicyiOS
* Fixes [#5589] https://github.com/microsoft/Microsoft365DSC/issues/5589
* SCAutoSensitivityLabelPolicy
* Use correct parameter `DesiredValues` given to `Test-M365DSCParameterState`,
contrary to `EXOTenantAllowBlockListItems` these resources are not affected
but we still should use the correct parameter
* SCLabelPolicy
* Use correct parameter `DesiredValues` given to `Test-M365DSCParameterState`,
contrary to `EXOTenantAllowBlockListItems` these resources are not affected
but we still should use the correct parameter
* SCSecurityFilter
* Use correct parameter `DesiredValues` given to `Test-M365DSCParameterState`,
contrary to `EXOTenantAllowBlockListItems` these resources are not affected
but we still should use the correct parameter
* SPOSPOBrowserIdleSignout
* Corrected export types where the schema expected a String, but received a different type
FIXES [#5648](https://github.com/microsoft/Microsoft365DSC/issues/5648)
* SPOSharingSettings
* Corrected export types where the schema expected a String, but received a different type
FIXES [#5648](https://github.com/microsoft/Microsoft365DSC/issues/5648)
* M365DSCReport
* Fix missing delimiter when called without the parameter.
FIXES [#5634](https://github.com/microsoft/Microsoft365DSC/issues/5634)
* Add configuration validation to inform about comparisons against empty or invalid configurations.
FIXES [#5658](https://github.com/microsoft/Microsoft365DSC/issues/5658)
* M365DSCTelemetryEngine
* Report LCM details only if running as administrator.
* M365DSCUtil
* In `Test-M365DSCParameterState` try to replace the line endings before
making the comparison otherwise it may fail as it did for a few resources
FIXES [#5648](https://github.com/microsoft/Microsoft365DSC/issues/5648)
* MISC
* Export Performance Improvements
Implements the changes described in [#5615](https://github.com/microsoft/Microsoft365DSC/issues/5615)
Improved resource caching behavior across Intune resources.

# 1.25.115.1

* AADAuthenticationRequirement
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -354,7 +354,6 @@ function Test-TargetResource

Write-Verbose -Message "Current Values: $(Convert-M365DscHashtableToString -Hashtable $CurrentValues)"
Write-Verbose -Message "Target Values: $(Convert-M365DscHashtableToString -Hashtable $ValuesToCheck)"

$testResult = $true
foreach ($reviewer in $Reviewers)
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -84,64 +84,58 @@ function Get-TargetResource
)
try
{
$ConnectionMode = New-M365DSCConnection -Workload 'MicrosoftGraph' `
-InboundParameters $PSBoundParameters
}
catch
{
Write-Verbose -Message ($_)
}

#Ensure the proper dependencies are installed in the current environment.
Confirm-M365DSCDependencies

#region Telemetry
$ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '')
$CommandName = $MyInvocation.MyCommand
$data = Format-M365DSCTelemetryParameters -ResourceName $ResourceName `
-CommandName $CommandName `
-Parameters $PSBoundParameters
Add-M365DSCTelemetryEvent -Data $data
#endregion

$nullResult = $PSBoundParameters
$nullResult.Ensure = 'Absent'
try
{
$getValue = $null
#region resource generator code
if (-not [string]::IsNullOrEmpty($Id))
if (-not $Script:exportedInstance)
{
if ($null -ne $Script:exportedInstances -and $Script:ExportMode)
try
{
$getValue = $Script:exportedInstances | Where-Object -FilterScript { $_.Id -eq $Id }
$ConnectionMode = New-M365DSCConnection -Workload 'MicrosoftGraph' `
-InboundParameters $PSBoundParameters
}
else
catch
{
Write-Verbose -Message ($_)
}

#Ensure the proper dependencies are installed in the current environment.
Confirm-M365DSCDependencies

#region Telemetry
$ResourceName = $MyInvocation.MyCommand.ModuleName.Replace('MSFT_', '')
$CommandName = $MyInvocation.MyCommand
$data = Format-M365DSCTelemetryParameters -ResourceName $ResourceName `
-CommandName $CommandName `
-Parameters $PSBoundParameters
Add-M365DSCTelemetryEvent -Data $data
#endregion

$nullResult = $PSBoundParameters
$nullResult.Ensure = 'Absent'

$getValue = $null
#region resource generator code
if (-not [string]::IsNullOrEmpty($Id))
{
$getValue = Get-MgBetaDirectoryAdministrativeUnit -AdministrativeUnitId $Id -ErrorAction SilentlyContinue
}
}

if ($null -eq $getValue -and -not [string]::IsNullOrEmpty($DisplayName))
{
Write-Verbose -Message "Could not find an Azure AD Administrative Unit by Id, trying by DisplayName {$DisplayName}"
if (-Not [string]::IsNullOrEmpty($DisplayName))
if ($null -eq $getValue -and -not [string]::IsNullOrEmpty($DisplayName))
{
if ($null -ne $Script:exportedInstances -and $Script:ExportMode)
{
$getValue = $Script:exportedInstances | Where-Object -FilterScript { $_.DisplayName -eq $DisplayName }
}
else
Write-Verbose -Message "Could not find an Azure AD Administrative Unit by Id, trying by DisplayName {$DisplayName}"
if (-Not [string]::IsNullOrEmpty($DisplayName))
{
$getValue = Get-MgBetaDirectoryAdministrativeUnit -Filter "DisplayName eq '$DisplayName'" -ErrorAction Stop
}
}
#endregion
if ($null -eq $getValue)
{
Write-Verbose -Message "Could not find an Azure AD Administrative Unit with DisplayName {$DisplayName}"
return $nullResult
}
}
#endregion
if ($null -eq $getValue)
else
{
Write-Verbose -Message "Could not find an Azure AD Administrative Unit with DisplayName {$DisplayName}"
return $nullResult
$getValue = $Script:exportedInstance
}
$Id = $getValue.Id
Write-Verbose -Message "An Azure AD Administrative Unit with Id {$Id} and DisplayName {$DisplayName} was found."
Expand Down Expand Up @@ -1099,6 +1093,7 @@ function Export-TargetResource
AccessTokens = $AccessTokens
}

$Script:exportedInstance = $config
$Results = Get-TargetResource @Params

if ($null -ne $Results.ScopedRoleMembers)
Expand Down
Loading

0 comments on commit a83edad

Please sign in to comment.